We present cryptanalysis of an image encryption scheme, which is based on the base-switching (BS) lossless compression algorithm. The following conclusions are reached: 1. the size of the key space, i.e., the security against brute-force attacks, was greatly overestimated by the designers; and 2. the scheme is not secure against known/chosen-plaintext/ciphertext attacks. A real example is given to show the feasibility of a proposed chosen-plaintext attack. In addition, some other minor problems of the joint compression-encryption scheme are also pointed out.
In this paper, two new broadcasting protocols are proposed for providing video-on-demand (VoD) services in multicast environment. The two protocols are developed by introducing a new first-segment delivery scheme for the skycraper and staggered protocols. With our approach, the first segment of a video is further divided into a number of small pieces so that customers can download the request data and start watching the video in a shorter time. The results show that the start-up latency for users is greatly reduced when using our new protocols.
KEYWORDS: Switching, Modulation, Error analysis, Signal to noise ratio, Video, Multimedia, Video processing, Multimedia signal processing, Electronics engineering, Data transmission
Adaptive modulation is an effective scheme to observably improve the performance of interactive video data transmission over mobile wireless channels. The effectiveness of adaptive modulation is affected by the accuracy of channel quality estimation. We analyzed in this paper the effect of channel quality estimation error on the performance of the adaptive modulation scheme with four parameters we proposed: Extra BER Cost (EBC), Potential Theoretical Channel Capacity Loss (PTCCL), average system EBC and average system PTCCL. Without considering the details of specific multimedia information to be transmitted, our measurements are simple and direct.
Proxy servers play an important role in between servers and clients in various multimedia systems on the Internet. Since proxy servers do not have an infinite-capacity cache for keeping all the continuous media data, the challenge for the replacement policy is to determine which streams should be cached or removed from the proxy server. In this paper, a new proxy replacement algorithm, named the Least Popular Used (LPU) caching algorithm, is proposed for layered encoded multimedia streams in the Internet. The LPU method takes both the short-term and long-term popularity of the video into account in determining the replacement policy. Simulation evaluation shows that our proposed scheme achieves better results than some existing methods in term of the cache efficiency and replacement frequency under both static and dynamic access environments.
An improved minimum distortion encoding method called predictive mean search (PMS) algorithm is proposed for image vector quantization in this paper. With the proposed method, the minimum distortion codeword can be found by searching only a portion of the codebook and its relative address to the origin of search is sent instead of absolute address. Two schemes are proposed to transmit the relative address of the minimum distortion codeword. Simulation results show that a significant reduction in both computations and bit-rates is achieved by using the proposed methods.
In this paper, we propose a new encoding method called predictive sub-codebook searching (PSCS) algorithm for vector quantization of images. This algorithm not only allows searching of a portion of the codebook to find the minimum distortion codeword of an input vector, but also permits the sending of the index of the codeword in sub-codebooks which requires shorter bit-length representation than that of the whole codebook. Computer simulations using real images show that the PSCS algorithm is very efficient since it requires a minimum number of computations among several existing fast encoding algorithms, and there is also about 8 to 21 percent bit-rate reduction depending on the natures of the images.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.